Insititutional, Political(legislative) & Social Discourse
Online Child Protection - Vulnerabilities
Technological Perspective
Commercial Perspective & Trafficking
Analysis of Offenders
“They’re flooding the internet”: A cross-national analysis of newspaper representations of the ‘internet predator’ in Australia, Canada, the UK and USA
“They’re flooding the internet”: A cross-national analysis of newspaper representations of the ‘internet predator’ in Australia, Canada, the UK and USA
Technology And Child Sex Trafficking: A Comparative Study Of The United States, Venezuela, And The Philippines
Technology And Child Sex Trafficking: A Comparative Study Of The United States, Venezuela, And The Philippines
Internet Child Sex Offenders' Concerns about Online Security and their Use of Identity Protection Technologies: A Review
Internet Child Sex Offenders' Concerns about Online Security and their Use of Identity Protection Technologies: A Review
Fighting Fire with Fire: Technology in Child Sex Trafficking
Fighting Fire with Fire: Technology in Child Sex Trafficking
The Enemy in the Screen: a Collective Case Study on Perpetrators of Internet Crimes Against Children
The Enemy in the Screen: a Collective Case Study on Perpetrators of Internet Crimes Against Children
Online Child Sexual Abuse: The French Response
Online Child Sexual Abuse: The French Response
Rhetorical moves and identity performance in online child sexual abuse interactions
Rhetorical moves and identity performance in online child sexual abuse interactions
Detecting child grooming behaviour patterns on social media
Detecting child grooming behaviour patterns on social media
Myspace, Yourspace, But Not Theirspace: The Constitutionality of Banning Sex Offenders From Social Networking Sites
Myspace, Yourspace, But Not Theirspace: The Constitutionality of Banning Sex Offenders From Social Networking Sites
Punishing Sexual Fantasy
Punishing Sexual Fantasy
Legal Aspects of Sweetie 2.0
Legal Aspects of Sweetie 2.0
A Unique Approach Against Child Sex Offenders: Jefferson County Cheezo Unit the Model for Success?
A Unique Approach Against Child Sex Offenders: Jefferson County Cheezo Unit the Model for Success?
The phenomenon of online live-streaming of child sexual abuse: Challenges and legal responses
The phenomenon of online live-streaming of child sexual abuse: Challenges and legal responses
The Phenomenon of Online Live-Streaming of Child Sexual Abuse: Challenges and Legal Responses
The Phenomenon of Online Live-Streaming of Child Sexual Abuse: Challenges and Legal Responses
Youth at Risk: Part 1, 2012 Massachusetts Family Impact Seminar
Youth at Risk: Part 1, 2012 Massachusetts Family Impact Seminar
Guidelines for Parents, Guardians and Educators on Child Online Protection
Guidelines for Parents, Guardians and Educators on Child Online Protection
The Online Sex Sting
The Online Sex Sting
A systematic review of fantasy driven vs. contact driven internet-initiated sexual offences: Discrete or overlapping typologies?
A systematic review of fantasy driven vs. contact driven internet-initiated sexual offences: Discrete or overlapping typologies?
Learning about online sexual harm
Learning about online sexual harm
Internet child sexual abuse
Internet child sexual abuse
Online sexual grooming: the role of offender motivation and grooming strategies
Online sexual grooming: the role of offender motivation and grooming strategies
The Cyber Crime and Internet and Internet Sexual Exploitation of Children
The Cyber Crime and Internet and Internet Sexual Exploitation of Children
Jail for Juvenile Child Pornographers?: A Reply to Professor Leary
Jail for Juvenile Child Pornographers?: A Reply to Professor Leary
Online Child Sex Solicitation: Exploring the feasibility of a research ‘sting’
Online Child Sex Solicitation: Exploring the feasibility of a research ‘sting’
Trends in Arrests of Online Predators .
Trends in Arrests of Online Predators .
The grooming process and the defence of consent in child sexual abuse cases
The grooming process and the defence of consent in child sexual abuse cases
Characterizing Pedophile Conversations on the Internet using Online Grooming
Characterizing Pedophile Conversations on the Internet using Online Grooming
Aspects of internet security - identity management and online child protection
Aspects of internet security - identity management and online child protection
Policing online child sexual abuse - the British experience
Policing online child sexual abuse - the British experience
An exploration of young people’s vulnerabilities to online grooming and sexual abuse
An exploration of young people’s vulnerabilities to online grooming and sexual abuse
Aspects of internet security: identity management and online child protection
Aspects of internet security: identity management and online child protection
Child exploitation and online protection centre (ceop) : the way forward
Child exploitation and online protection centre (ceop) : the way forward
The role of inhibitory control in defining typologies of internet sex offenders
The role of inhibitory control in defining typologies of internet sex offenders
A scoping review and gap analysis of interventions for perpetrators of online child sexual exploitation
A scoping review and gap analysis of interventions for perpetrators of online child sexual exploitation
Protection and Security in a Technologically Advanced Society: Children and Young People’s Perspectives
Protection and Security in a Technologically Advanced Society: Children and Young People’s Perspectives
Online sex offending: approaches to assessment and intervention [introduction to the special issue]
Online sex offending: approaches to assessment and intervention [introduction to the special issue]
Online child sexual abuse by female offenders: an exploratory study
Online child sexual abuse by female offenders: an exploratory study
An exploratory study of public reports to investigate patterns and themes of requests for sexual images of minors online
An exploratory study of public reports to investigate patterns and themes of requests for sexual images of minors online
Online child sexual exploitation:prevalence, process, and offender characteristics
Online child sexual exploitation:prevalence, process, and offender characteristics
Online child sexual exploitation:prevalence, process, and offender characteristics
Online child sexual exploitation:prevalence, process, and offender characteristics
Online sexual grooming: children as victims of online abuse
Online sexual grooming: children as victims of online abuse
A Dark Side of Computing and Information Sciences: Characteristics of Online Groomers
A Dark Side of Computing and Information Sciences: Characteristics of Online Groomers
A Dark Side of Computing and Information Sciences: Characteristics of Online Groomers
A Dark Side of Computing and Information Sciences: Characteristics of Online Groomers
International and internet child sexual abuse and exploitation
International and internet child sexual abuse and exploitation
Exploring the Online Communicative Themes of Child Sex Offenders
Exploring the Online Communicative Themes of Child Sex Offenders
Internet Facilitated Rape: A Multivariate Model of Offense Behavior
Internet Facilitated Rape: A Multivariate Model of Offense Behavior
An exploratory study of public reports to investigate patterns and themes of requests for sexual images of minors online
An exploratory study of public reports to investigate patterns and themes of requests for sexual images of minors online
Rapid Evidence Assessment:Characteristics and vulnerabilities of victims of online-facilitated child sexual abuse and exploitation
Rapid Evidence Assessment:Characteristics and vulnerabilities of victims of online-facilitated child sexual abuse and exploitation
Transnational Child Sexual Abuse: Outcomes from a Roundtable Discussion
Transnational Child Sexual Abuse: Outcomes from a Roundtable Discussion
Internet Facilitated Rape: A Multivariate Model of Offense Behavior.
Internet Facilitated Rape: A Multivariate Model of Offense Behavior.
Internet Facilitated Rape: A Multivariate Model of Offense Behavior
Internet Facilitated Rape: A Multivariate Model of Offense Behavior
Fantasy depictions of child sexual abuse: The problem of ageplay in Second Life
Fantasy depictions of child sexual abuse: The problem of ageplay in Second Life
Deterrence of online child sexual abuse and exploitation
Deterrence of online child sexual abuse and exploitation
A/S/L 45/John Doe Offender/Federal Prison - The Third Circuit Takes a Hard Line against Child Predators in United States v. Tykarsky
A/S/L 45/John Doe Offender/Federal Prison - The Third Circuit Takes a Hard Line against Child Predators in United States v. Tykarsky
Online Victimization of Youth : Five Years Later.
Online Victimization of Youth : Five Years Later.
Online Grooming: An Exploration into the Genetic-Social Variables which Enable Victimisation
Online Grooming: An Exploration into the Genetic-Social Variables which Enable Victimisation
Best practice in the management of online sex offending
Best practice in the management of online sex offending
Exploring the Online Communicative Themes of Child Sex Offenders
Exploring the Online Communicative Themes of Child Sex Offenders
Online risks and children
Online risks and children
The internet and sexual offending: an international perspective
The internet and sexual offending: an international perspective
A criminological analysis : using real-time monitoring to gather data on online predators
A criminological analysis : using real-time monitoring to gather data on online predators
Protecting Children in Cyberspace
Protecting Children in Cyberspace
A criminological analysis : using real-time monitoring to gather data on online predators
A criminological analysis : using real-time monitoring to gather data on online predators
British newspaper coverage of child sexual abuse : relating news to policy and social discourses
British newspaper coverage of child sexual abuse : relating news to policy and social discourses
Online Sexual Solicitation of Minors: How Often and between Whom Does It Occur?
Online Sexual Solicitation of Minors: How Often and between Whom Does It Occur?
A qualitative analysis of offenders' modus operandi in sexually exploitative interactions with children online
A qualitative analysis of offenders' modus operandi in sexually exploitative interactions with children online
Internet-Facilitated Commercial Sexual Exploitation of Children.
Internet-Facilitated Commercial Sexual Exploitation of Children.
Detecting psycho-anomalies on the world-wide web: current tools and challenges
Detecting psycho-anomalies on the world-wide web: current tools and challenges
Male Child Victim of Sexual Abuse in Nigeria
Male Child Victim of Sexual Abuse in Nigeria
Historical review of sexual offence and child sexual abuse legislation in Australia: 1788–2013
Historical review of sexual offence and child sexual abuse legislation in Australia: 1788–2013
Myspace, but Whose Responsibility - Liability of Social-Networking Websites When Offline Sexual Assault of Minors Follows Online Interaction
Myspace, but Whose Responsibility - Liability of Social-Networking Websites When Offline Sexual Assault of Minors Follows Online Interaction
Florida Teacher Perceptions Concerning Internet Dangers For Students
Florida Teacher Perceptions Concerning Internet Dangers For Students
Protecting Children Online: Exploring the Impact of an Online Identifier for Registered Sex Offenders on Adult Internet Users’ Online Information Sharing Behaviors
Protecting Children Online: Exploring the Impact of an Online Identifier for Registered Sex Offenders on Adult Internet Users’ Online Information Sharing Behaviors
Legislative models of prosecuting child sexual abuse in India: A review and critical analysis
Legislative models of prosecuting child sexual abuse in India: A review and critical analysis
Primary prevention of child sexual abuse: Child focused interventions
Primary prevention of child sexual abuse: Child focused interventions
Best practice in the management of online sex offending
Best practice in the management of online sex offending
Average Teenager or Sex Offender? Solutions to the Legal Dilemma Caused by Sexting, 26 J. Marshall J. Computer & Info. L. 431 (2009)
Average Teenager or Sex Offender? Solutions to the Legal Dilemma Caused by Sexting, 26 J. Marshall J. Computer & Info. L. 431 (2009)
Protecting children from sex offenders online: when strangers become 'virtual friends'
Protecting children from sex offenders online: when strangers become 'virtual friends'
London guidelines for assessing children and families affected by adults viewing child sexual abuse images on the internet
London guidelines for assessing children and families affected by adults viewing child sexual abuse images on the internet
Misperceptions about child sex offenders
Misperceptions about child sex offenders
The Sexual Exploitation of Children: A Guide to the Empirical Literature
The Sexual Exploitation of Children: A Guide to the Empirical Literature
Young Adult Perceptions of Internet Communications and the Grooming Concept
Young Adult Perceptions of Internet Communications and the Grooming Concept
Offense Processes of Online Sexual Grooming and Abuse of Children Via Internet Communication Platforms
Offense Processes of Online Sexual Grooming and Abuse of Children Via Internet Communication Platforms
Online sexual grooming : a cross-cultural perspective on online child grooming victimization
Online sexual grooming : a cross-cultural perspective on online child grooming victimization
The impact of Self-Generated Images in online pornography
The impact of Self-Generated Images in online pornography
The Role of Sexual Images in Online and Offline Sexual Behavior with Minors.
The Role of Sexual Images in Online and Offline Sexual Behavior with Minors.
Offense Processes of Online Sexual Grooming and Abuse of Children Via Internet Communication Platforms
Offense Processes of Online Sexual Grooming and Abuse of Children Via Internet Communication Platforms
Offense Processes of Online Sexual Grooming and Abuse of Children via Internet Communication Platforms
Offense Processes of Online Sexual Grooming and Abuse of Children via Internet Communication Platforms
e-Youth: (future) policy implications: reflections on online risk, harm and vulnerability
e-Youth: (future) policy implications: reflections on online risk, harm and vulnerability
Comparing adult-youth and adult-adult online sexual solicitation: Manipulative behaviors, situational factors, and outcomes
Comparing adult-youth and adult-adult online sexual solicitation: Manipulative behaviors, situational factors, and outcomes
“Under his spell”:victims’ perspectives of being groomed online
“Under his spell”:victims’ perspectives of being groomed online
The Use of New Communications and Information Technologies for Sexual Exploitation of Women and Children
The Use of New Communications and Information Technologies for Sexual Exploitation of Women and Children
“Under his spell”:victims’ perspectives of being groomed online
“Under his spell”:victims’ perspectives of being groomed online
The Use of New Communications and Information Technologies for Sexual Exploitation of Women and Children
The Use of New Communications and Information Technologies for Sexual Exploitation of Women and Children
Protecting Children in Cyberspace
Protecting Children in Cyberspace
Sexting and Teenagers: OMG R U Going 2 Jail???
Sexting and Teenagers: OMG R U Going 2 Jail???
Kerja Sama Interpol – Britania Raya dalam Memerangi Kejahatan Siber: Studi Kasus Peningkatan Online Child Sexual Abuse di Britania Raya
Kerja Sama Interpol – Britania Raya dalam Memerangi Kejahatan Siber: Studi Kasus Peningkatan Online Child Sexual Abuse di Britania Raya
Doe v. KIK
Doe v. KIK
Growth and change in undercover online child exploitation investigations, 2000–2006
Growth and change in undercover online child exploitation investigations, 2000–2006
Protecting Children in Cyberspace
Protecting Children in Cyberspace
Is talking online to unknown people always risky? Distinguishing online interaction styles in a national sample of youth Internet users.
Is talking online to unknown people always risky? Distinguishing online interaction styles in a national sample of youth Internet users.
Over the Internet, Under the Radar : Prevention of Online Child Sexual Abuse and Exploitation in Scotland
Over the Internet, Under the Radar : Prevention of Online Child Sexual Abuse and Exploitation in Scotland
Child Sexual Abuse in the Eastern Caribbean: The report of a study carried out across the Eastern Caribbean during the period October 2008 to June 2009
Child Sexual Abuse in the Eastern Caribbean: The report of a study carried out across the Eastern Caribbean during the period October 2008 to June 2009
Internet regulation of harmful content affecting children
Internet regulation of harmful content affecting children
Protecting Children in Cyberspace
Protecting Children in Cyberspace
A review of online grooming:characteristics and concerns
A review of online grooming:characteristics and concerns
Psychosocial Variables Common among Child Victims of Sex Trafficking
Psychosocial Variables Common among Child Victims of Sex Trafficking
The online social network era: are the children protected in Malaysia?
The online social network era: are the children protected in Malaysia?
A review of online grooming:characteristics and concerns
A review of online grooming:characteristics and concerns
Exploring online sexual extortion in Scotland
Exploring online sexual extortion in Scotland
Deceptive identity performance:Offender moves and multiple identities in online child abuse conversations
Deceptive identity performance:Offender moves and multiple identities in online child abuse conversations
This doesn\u27t happen here : Child sex trafficking in rural Oklahoma
This doesn\u27t happen here : Child sex trafficking in rural Oklahoma
Protecting Children from Online Exploitation and Abuse: An Overview of Project Safe Childhood
Protecting Children from Online Exploitation and Abuse: An Overview of Project Safe Childhood
Exploring online sexual extortion in Scotland
Exploring online sexual extortion in Scotland
Offenders who use child sexual exploitation material: Development of an integrated model for their classification, assessment, and treatment
Offenders who use child sexual exploitation material: Development of an integrated model for their classification, assessment, and treatment
A comparison of victim and offender perspectives of grooming and sexual abuse
A comparison of victim and offender perspectives of grooming and sexual abuse
Exploring the Extent to Which the Utilization of Technology Has Facilitated the Increased Possession of Online Child Pornography over Time
Exploring the Extent to Which the Utilization of Technology Has Facilitated the Increased Possession of Online Child Pornography over Time
Researching online child sexual exploitation and abuse: are there links between online and offline vulnerabilities?
Researching online child sexual exploitation and abuse: are there links between online and offline vulnerabilities?
Producers of indecent images of children : a qualitative analysis of the aetiology and development of their offending patterns
Producers of indecent images of children : a qualitative analysis of the aetiology and development of their offending patterns
A comparison of victim and offender perspectives of grooming and sexual abuse
A comparison of victim and offender perspectives of grooming and sexual abuse
Adolescents in a Digital Everyday Environment
Adolescents in a Digital Everyday Environment
Internet Sex Crimes Against Minors: The Response of Law Enforcement.
Internet Sex Crimes Against Minors: The Response of Law Enforcement.
“go on cam but dnt be dirty”: linguistic levels of identity assumption in undercover online operations against child sex abusers
“go on cam but dnt be dirty”: linguistic levels of identity assumption in undercover online operations against child sex abusers
Fighting Child Pornography: A Review of Legal and Technological Developments
Fighting Child Pornography: A Review of Legal and Technological Developments
Online Sex Slaves: The Internet\u27s Powerful Role in Sex Trafficking
Online Sex Slaves: The Internet\u27s Powerful Role in Sex Trafficking
The role of child sexual abuse images in coercive and non-coercive relationships with adolescents:A thematic review of the literature
The role of child sexual abuse images in coercive and non-coercive relationships with adolescents:A thematic review of the literature
Online victimization: A report on the nation’s youth.
Online victimization: A report on the nation’s youth.
The three dimensions of online child pornography offending
The three dimensions of online child pornography offending
What Practices Can Protect School-Aged Minors from Online Sexual Predators in the United States?
What Practices Can Protect School-Aged Minors from Online Sexual Predators in the United States?
The Internet and Family and Acquaintance Sexual Abuse
The Internet and Family and Acquaintance Sexual Abuse
The Internet and Family and Acquaintance Sexual Abuse
The Internet and Family and Acquaintance Sexual Abuse
Child Pornography: Model Legislation & Global Review
Child Pornography: Model Legislation & Global Review
The Internet and Family and Acquaintance Sexual Abuse
The Internet and Family and Acquaintance Sexual Abuse
Annual Research Review: Harms experienced by child users of online and mobile technologies: the nature, prevalence and management of sexual and aggressive risks in the digital age
Annual Research Review: Harms experienced by child users of online and mobile technologies: the nature, prevalence and management of sexual and aggressive risks in the digital age
United States v. R.V.
United States v. R.V.
“ cause ur special ”: Understanding trust and complimenting behaviour in online grooming discourse
“ cause ur special ”: Understanding trust and complimenting behaviour in online grooming discourse
The SAVE Act of 2015: Congress\u27 Attempt to Reprioritize Online Child Sex Trafficking
The SAVE Act of 2015: Congress\u27 Attempt to Reprioritize Online Child Sex Trafficking
Child Sexual Abuse and Exploitation: Guest Editor’s Introduction
Child Sexual Abuse and Exploitation: Guest Editor’s Introduction
U.S./European Summit on Missing & Exploited Children
U.S./European Summit on Missing & Exploited Children
Annual research review: harms experienced by child users of online and mobile technologies: the nature, prevalence and management of sexual and aggressive risks in the digital age
Annual research review: harms experienced by child users of online and mobile technologies: the nature, prevalence and management of sexual and aggressive risks in the digital age
Fighting Child Pornography: A Review of Legal and Technological Developments
Fighting Child Pornography: A Review of Legal and Technological Developments
The Rise of Mobile and the Diffusion of Technology-Facilitated Trafficking
The Rise of Mobile and the Diffusion of Technology-Facilitated Trafficking
Interventions for children, youth, and parents to prevent and reduce cyber abuse
Interventions for children, youth, and parents to prevent and reduce cyber abuse
Conceptualising the prevention of child sexual abuse
Conceptualising the prevention of child sexual abuse
Online risk, harm and vulnerability: reflections on the evidence base for child Internet safety policy
Online risk, harm and vulnerability: reflections on the evidence base for child Internet safety policy
Fighting Child Pornography: A Review of Legal and Technological Developments
Fighting Child Pornography: A Review of Legal and Technological Developments
High Tech or High Risk: Moral Panics about Girls Online
High Tech or High Risk: Moral Panics about Girls Online
Researching Online Child Sexual Exploitation and Abuse:Are There Links Between Online and Offline Vulnerabilities?
Researching Online Child Sexual Exploitation and Abuse:Are There Links Between Online and Offline Vulnerabilities?
Logistic Models for Classifying Online Grooming Conversation
Logistic Models for Classifying Online Grooming Conversation
Users of online indecent images of children (IIOC): an investigation into aetiological and perpetuating risk factors, the offending process, the risk of perpetrating a contact sexual offence, and protective factors
Users of online indecent images of children (IIOC): an investigation into aetiological and perpetuating risk factors, the offending process, the risk of perpetrating a contact sexual offence, and protective factors
Avoiding Online Predators: Proactive Measures Companies Can Take to Protect Their Female Consumers
Avoiding Online Predators: Proactive Measures Companies Can Take to Protect Their Female Consumers
Characteristics of internet sexual offenders: a review
Characteristics of internet sexual offenders: a review
Online predators
Online predators
Policy of European Union on the Safety of Children in Cyber Space
Policy of European Union on the Safety of Children in Cyber Space
The Mechanism of Sex Trafficking and What You Can Do About it
The Mechanism of Sex Trafficking and What You Can Do About it
A review of young people's vulnerabilities to online grooming
A review of young people's vulnerabilities to online grooming
Identifying vulnerable children online and what strategies can help them
Identifying vulnerable children online and what strategies can help them
Online child sexual abuse imagery
Online child sexual abuse imagery
A review of young people's vulnerabilities to online grooming
A review of young people's vulnerabilities to online grooming
It's a lonely journey: a rapid evidence assessment on intrafamilial child sexual abuse
It's a lonely journey: a rapid evidence assessment on intrafamilial child sexual abuse
Prosecuting Cyber-Pedophiles: How Can Intent Be Shown in a Virtual World in Light of the Fantasy Defense?
Prosecuting Cyber-Pedophiles: How Can Intent Be Shown in a Virtual World in Light of the Fantasy Defense?
A Qualitative Analysis of Offenders’ Modus Operandi in Sexually Exploitative Interactions With Children Online
A Qualitative Analysis of Offenders’ Modus Operandi in Sexually Exploitative Interactions With Children Online
Greek Primary Educators\u27 Perceptions of Strategies for Mitigating Cyber Child Exploitation
Greek Primary Educators\u27 Perceptions of Strategies for Mitigating Cyber Child Exploitation
Behind the Curtains of e-State: Determinants of Online Sexual Harassment Among Estonian Children
Behind the Curtains of e-State: Determinants of Online Sexual Harassment Among Estonian Children
Actual Policing in Virtual Reality - A Cause of Moral Panic or a Justified Need?
Actual Policing in Virtual Reality - A Cause of Moral Panic or a Justified Need?
Behind the Curtains of e-State: Determinants of Online Sexual Harassment Among Estonian Children
Behind the Curtains of e-State: Determinants of Online Sexual Harassment Among Estonian Children
Evidence on the extent of harms experienced by children as a result of online risks: Implications for policy and research
Evidence on the extent of harms experienced by children as a result of online risks: Implications for policy and research
Supporting law enforcement in digital communities through natural language analysis
Supporting law enforcement in digital communities through natural language analysis
Protecting Children Online: Identifying Registered Sex Offenders’ Presence on the Internet and Consequent Online Social Behavior
Protecting Children Online: Identifying Registered Sex Offenders’ Presence on the Internet and Consequent Online Social Behavior
Current Perspectives on Violence Against Children in Europe
Current Perspectives on Violence Against Children in Europe
The child pornography crusade and its net-widening effect
The child pornography crusade and its net-widening effect
Child-Pornography Possessors Arrested in Internet-Related Crimes: Findings From the National Juvenile Online Victimization Study.
Child-Pornography Possessors Arrested in Internet-Related Crimes: Findings From the National Juvenile Online Victimization Study.
Online grooming and preventive justice
Online grooming and preventive justice
Children's online activities, risks and safety: the UK evidence base
Children's online activities, risks and safety: the UK evidence base
Solving the Sextortion Puzzle: Piecing Together a Model State Sextortion Statute
Solving the Sextortion Puzzle: Piecing Together a Model State Sextortion Statute
‘go on cam but dnt be dirty’: linguistic levels of identity assumption in undercover online operations against child sex abusers
‘go on cam but dnt be dirty’: linguistic levels of identity assumption in undercover online operations against child sex abusers
Kerentanan kanak-kanak Malaysia terhadap pengantunan seksual dalam talian
Kerentanan kanak-kanak Malaysia terhadap pengantunan seksual dalam talian
Child Sexual Abuse, Links to Later Sexual Exploitation/High-Risk Sexual Behavior, and Prevention/Treatment Programs
Child Sexual Abuse, Links to Later Sexual Exploitation/High-Risk Sexual Behavior, and Prevention/Treatment Programs
Solving the Sextortion Puzzle: Piecing Together a Model State Sextortion Statute
Solving the Sextortion Puzzle: Piecing Together a Model State Sextortion Statute
Responses to the sexual abuse and sexual exploitation of children in residential care in Victoria
Responses to the sexual abuse and sexual exploitation of children in residential care in Victoria
Differences between journalistic and academic accounts of child sexual abuse in Australia
Differences between journalistic and academic accounts of child sexual abuse in Australia
Exposure to pornography and sexual exploitation of children : an interpretive approach
Exposure to pornography and sexual exploitation of children : an interpretive approach
Child sexual abuse by teachers in secondary schools in the Masvingo District, Zimbabwe : perceptions of selected stakeholders
Child sexual abuse by teachers in secondary schools in the Masvingo District, Zimbabwe : perceptions of selected stakeholders
The dark side of social media: interviews with exploited teens in East Asia
The dark side of social media: interviews with exploited teens in East Asia
Situational Prevention of Child Abuse in the New Technologies
Situational Prevention of Child Abuse in the New Technologies
When Sex and Cell Phones Collide: Inside the Prosecution of a Teen Sexting Case
When Sex and Cell Phones Collide: Inside the Prosecution of a Teen Sexting Case
Online Grooming and Preventive Justice
Online Grooming and Preventive Justice
Children’s Online Behaviour and Safety Policy and Rights Challenges
Children’s Online Behaviour and Safety Policy and Rights Challenges
Romeo and Juliet Online and in Trouble: Criminalizing Depictions of Teen Sexuality
Romeo and Juliet Online and in Trouble: Criminalizing Depictions of Teen Sexuality
Good practice guidance for the providers of chat services, instant messaging (im) and internet connectivity content and hosting
Good practice guidance for the providers of chat services, instant messaging (im) and internet connectivity content and hosting
The Adam Walsh Child Protection and Safety Act: Legal and Psychological Aspects of the New Civil Commitment Law for Federal Civil Commitment Law For Federal Sex Offenders
The Adam Walsh Child Protection and Safety Act: Legal and Psychological Aspects of the New Civil Commitment Law for Federal Civil Commitment Law For Federal Sex Offenders
Assuming identities online:experimental linguistics applied to the policing of online paedophile activity
Assuming identities online:experimental linguistics applied to the policing of online paedophile activity
Behind the Curtains of e-State: Determinants of Online Sexual Harassment Among Estonian Children
Behind the Curtains of e-State: Determinants of Online Sexual Harassment Among Estonian Children
Child sexual exploitation : definition & guide for professionals: extended text
Child sexual exploitation : definition & guide for professionals: extended text
Internet-initiated incitement and conspiracy to commit child sexual abuse (CSA): The typology, extent and nature of known cases
Internet-initiated incitement and conspiracy to commit child sexual abuse (CSA): The typology, extent and nature of known cases
The Adam Walsh Child Protection and Safety Act: Legal and Psychological Aspects of the New Civil Commitment Law for Federal Civil Commitment Law For Federal Sex Offenders
The Adam Walsh Child Protection and Safety Act: Legal and Psychological Aspects of the New Civil Commitment Law for Federal Civil Commitment Law For Federal Sex Offenders
Assuming Identities Online: Experimental Linguistics Applied to the Policing of Online Paedophile Activity
Assuming Identities Online: Experimental Linguistics Applied to the Policing of Online Paedophile Activity
Attempted Enticement of a Minor: No Place for Pedophiles to Hide under 18 U.S.C. 2422(b)
Attempted Enticement of a Minor: No Place for Pedophiles to Hide under 18 U.S.C. 2422(b)
Kindersekstoeristen: Een literatuurverkenning naar kenmerken, motieven en werkwijzen van (Nederlandse) daders
Kindersekstoeristen: Een literatuurverkenning naar kenmerken, motieven en werkwijzen van (Nederlandse) daders
Understanding Grooming Discourse in Computer Mediated Environments
Understanding Grooming Discourse in Computer Mediated Environments
Strategies and Behaviors of Cyber Deviance and Internet Trolling
Strategies and Behaviors of Cyber Deviance and Internet Trolling
Data on fantasy vs contact driven internet-initiated sexual offences: Study selection, appraisal and characteristics
Data on fantasy vs contact driven internet-initiated sexual offences: Study selection, appraisal and characteristics
Assessing parental risk in parenting plan (child custody) evaluation cases involving internet sexual behavior
Assessing parental risk in parenting plan (child custody) evaluation cases involving internet sexual behavior
Regulating the internet in the interests of children: emerging European and international approaches
Regulating the internet in the interests of children: emerging European and international approaches
The Commonalities and Shared Experiences of Female Prostitutes Who Were Sexually Exploited as Children: The Perspectives of Clinical Social Workers
The Commonalities and Shared Experiences of Female Prostitutes Who Were Sexually Exploited as Children: The Perspectives of Clinical Social Workers
In their own words:young peoples’ vulnerabilities to being groomed and sexually abused online
In their own words:young peoples’ vulnerabilities to being groomed and sexually abused online